Mythbusters: All Data Encryption is the Same, Right?

Many small businesses opt for wireless networks; they provide the connection you need and are easier and less expensive to set up than a wired network. But that convenience can cost your company in compromised security and lost data if the network isn’t appropriately encrypted.small_business, wireless, wireless network, WLAN, security

All WLAN gear includes some form of encryption. WEP is included in most wireless networking devices; however, it is considered a weaker encryption protocol and is easily compromised by cyber attackers. Therefore, you shouldn’t rely on it for securing your small business LAN.

Instead, opt for one of the stronger security protocols—WPA or WPA2, which are supported by most wireless networking gear. Both WPA and WPA2 use the Advanced Encryption Standard (AES), which is intended to provide greater encryption.

One thing to note: Each WLAN device must be set to the same encryption protocol. If you have older devices that aren’t compatible with WPA or WPA2, you’ll need to upgrade them to support the stronger protocols.

Finally, if you have employees that work remotely, you’ll want to make sure they’re encrypting their wirelesshome networks using WPA or WPA2.

Some of the individuals posting to this site, including the moderators, work for Cisco Systems. Opinions expressed here and in any corresponding comments are the personal opinions of the original authors, not of Cisco. The content is provided for informational purposes only and is not meant to be an endorsement or representation by Cisco or any other party. This site is available to the public. No information you consider confidential should be posted to this site. By posting you agree to be solely responsible for the content of all information you contribute, link to, or otherwise upload to the Website and release Cisco from any liability related to your use of the Website. You also grant to Cisco a worldwide, perpetual, irrevocable, royalty-free and fully-paid, transferable (including rights to sublicense) right to exercise all copyright, publicity, and moral rights with respect to any original content you provide. The comments are moderated. Comments will appear as soon as they are approved by the moderator.